Login about (844) 217-0978

Jason Mackay

In the United States, there are 76 individuals named Jason Mackay spread across 36 states, with the largest populations residing in California, Utah, Colorado. These Jason Mackay range in age from 28 to 51 years old. Some potential relatives include Juan Mackay, Tyler Mackay, Andrea Faurot. You can reach Jason Mackay through various email addresses, including jason.mac***@yahoo.com, jasonmac***@hotmail.com, jmac***@yahoo.com. The associated phone number is 231-898-4806, along with 6 other potential numbers in the area codes corresponding to 413, 425, 508. For a comprehensive view, you can access contact details, phone numbers, addresses, emails, social media profiles, arrest records, photos, videos, public records, business records, resumes, CVs, work history, and related names to ensure you have all the information you need.

Public information about Jason Mackay

Resumes

Resumes

Sting Marketing, Llc

Jason Mackay Photo 1
Location:
Charlotte, North Carolina Area
Industry:
Marketing and Advertising

Jason Mackay - Grand Haven, MI

Jason Mackay Photo 2
Work:
Holland Public Schools Feb 2008 to 2000
Buildings and Grounds Supervisor Morden Electric, Inc 1994 to Feb 2008
Master Electrician/Project Foreman
Skills:
Master Electrician
UST A and B Operator
EPA Lead Renovator
NCRC Gold level certification

Jason Mackay

Jason Mackay Photo 3
Location:
Greater Detroit Area
Industry:
Information Technology and Services
Work:
PC Express, Inc. Feb 2005 - Apr 2011
President, CEO Lenawee County Dec 2006 - Dec 2010
County Commissioner Tecumseh Products Company 2006 - 2007
Network Specialist
Education:
Jackson Community College
Certifications, Information Technology

Software Development Engineer At Microsoft Corp

Jason Mackay Photo 4
Location:
Greater Seattle Area
Industry:
Computer Software

Jason Mackay - Adrian, MI

Jason Mackay Photo 5
Work:
PlumChoice / Technisource / AT&T Apr 2011 to 2000
IT Support Specialist PC Express, Inc 2005 to 2000
President, CEO Lenawee County - Adrian, MI 2006 to 2010
County Commissioner - IT & Equalization Subcommittees Selective Data Systems - Onsted, MI 2006 to 2007
Network Specialist
Skills:
Google Adwords, Inventory Management Systems.

Senior Software Developer At Microsoft Research, Redmond

Jason Mackay Photo 6
Position:
Senior Software Developer at Microsoft Research, Redmond
Location:
Greater Seattle Area
Industry:
Computer Software
Work:
Microsoft Research, Redmond - Redmond since Jun 2010
Senior Software Developer Microsoft - Redmond, WA Jan 2008 - Aug 2010
Software Development Engineer 2 Microsoft - Redmond Jan 2004 - Dec 2008
Software Development Engineer I Microsoft - Redmond Sep 1998 - Dec 2004
Software Developer in Test
Education:
University of Washington 2009 - 2012
BS, Computer Science, Mathematics

Jason Mackay - Charlotte, NC

Jason Mackay Photo 7
Work:
Red Ventures Nov 2009 to 2000
Post Sale Operations & Quality Assurance Analyst Sting Marketing LLC - Charlotte, NC Jun 2009 to Nov 2009
Director of Sales & Design J-Crew - Charlotte, NC Nov 2008 to Mar 2009
Sales Representative Hewitt Associates LLC - Charlotte, NC Jul 2001 to Jun 2008
Operations Business Analyst III Wachovia Securities, LLC - Charlotte, NC Nov 2000 to Mar 2001
Physical Processing
Education:
SAN DIEGO STATE UNIVERSITY - San Diego, CA 1999
Bachelor of Liberal Arts

Jason Mackay - Las Vegas, NV

Jason Mackay Photo 8
Work:
Primera Interiors - Las Vegas, NV May 2012 to Jan 2013
Production Coordinator Creative Countertops 2007 to 2012
Office Manager Creative Countertops 2006 to 2007
CAD Manager Creative Countertops 2005 to 2006
CAD Technician Instal Pro - Salt Lake City, UT 2004 to 2005
Installation Technician Roger Smith Solid Surfaces - Salt Lake City, UT 2002 to 2004
Countertop Fabricator
Education:
University of Phoenix 2009
Bachelor of Science in Business Administration LDS Business College 2003
Associate of Science in Business

Phones & Addresses

Name
Addresses
Phones
Jason J Mackay
616-842-2327
Jason J Mackay
616-842-2327
Jason Mackay
231-898-4806
Jason K Mackay
810-385-7698
Jason K Mackay
509-703-7036
Jason Mackay
413-203-1627
Jason L Mackay
916-775-1927
Jason Mackay
707-541-6697, 707-584-2337, 707-586-2017, 707-586-9485

Publications

Us Patents

Anonymous Principals For Policy Languages

US Patent:
2012015, Jun 21, 2012
Filed:
Dec 16, 2010
Appl. No.:
12/970867
Inventors:
Tolga Acar - Sammamish WA, US
Thomas Roeder - Redmond WA, US
Jason Mackay - Sammamish WA, US
Brian LaMacchia - Seattle WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
H04L 9/32
US Classification:
726 4, 726 5, 726 6
Abstract:
Techniques to allow a security policy language to accommodate anonymous credentials are described. A policy statement in a security policy language can reference an anonymous credential. When the policy statement is evaluated to decide whether to grant access to a resource mediated by the policy statement, the anonymous credential is used. The policy language can be implemented to allow one anonymous credential to delegate access-granting rights to another anonymous credential. Furthermore, an anonymous credential can be re-randomized to avoid linkage between uses of the anonymous credential, which can compromise anonymity.

Credential Gathering With Deferred Instantiation

US Patent:
2010020, Aug 12, 2010
Filed:
Feb 6, 2009
Appl. No.:
12/367502
Inventors:
Moritz Y. Becker - Cambridge, GB
Jason F. Mackay - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
H04L 9/32
G06F 17/00
US Classification:
726 1, 726 2, 726 5
Abstract:
Credentials may be gathered to support an access request. In one example, a template describes the credentials to be gathered. A set of credential providers may be consulted, in a particular sequence, to provide the credentials. Credentials may contain variables, and each credential provider may impose its own constraints on the values to be assigned to the variables. Instantiation of the variables may be deferred to a downstream credential provider, thereby allowing each credential provider to specify its constraints on the variables before specific values for the variables are chosen. In one example, an instantiation fact (or “inst fact”) is used to represent the deferred instantiation. A provider may use an inst fact to make its credentials conditional on the instantiation of the variables that the credential contains, where some downstream provider may attempt to instantiate the variables to specific values.

Abducing Assertion To Support Access Query

US Patent:
8010560, Aug 30, 2011
Filed:
Dec 21, 2007
Appl. No.:
11/962746
Inventors:
Moritz Y. Becker - Cambridge, GB
Jason F. Mackay - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 17/00
US Classification:
707783, 713151, 726 1
Abstract:
Logical abduction is used to derive the premises that support an access query. In a logic-based access-control system, a query, as to one or more principals' right to access one or more resources, is a statement that can be either true or false. The statement evaluates to true if the principal is allowed to access the resource under the existing set of assertions. Assertions that, if made, would cause the statement to be true can be abduced from the query and from the policy against which the truth of the query is to be judged. The abduced assertions can be used to assist in making the appropriate assertions to cause the query to evaluate to true so that access to the resource can be granted.

Access Policy Analysis

US Patent:
2009019, Jul 30, 2009
Filed:
Jan 28, 2008
Appl. No.:
12/021299
Inventors:
Moritz Y. Becker - Cambridge, GB
Blair B. Dillaway - Clyde Hill WA, US
Gregory D. Fee - Seattle WA, US
Jason F. Mackay - Redmond WA, US
Jason Hogg - Kirkland WA, US
John M. Leen - Seattle WA, US
Assignee:
MICROSOFT CORPORATION - Redmond WA
International Classification:
G06F 21/00
G06F 17/00
H04L 9/32
US Classification:
726 1, 726 9
Abstract:
Software tools assist an access-policy analyst or creator to debug and/or author access policies. An access request contains a query that evaluates to either true or false depending on whether access is to be allowed. Abduction may be used to generate assumptions that, if true, would cause the access request to be true. The tool may perform analysis on the generated assumptions, such as: comparing the assumptions with tokens to detect errors in the tokens or to suggest changes to the tokens that would cause the query to be satisfied, or comparing the assumptions to a meta-policy. The tool may allow an analysis, policy author, or other person to interactively walk through assumptions in order to see the implications of the access policy.

Security Language Translations With Logic Resolution

US Patent:
2008006, Mar 13, 2008
Filed:
Sep 11, 2006
Appl. No.:
11/530556
Inventors:
Moritz Y. Becker - Cambridge, GB
Blair B. Dillaway - Redmond WA, US
Cedric Fournet - Cambridge, GB
Andrew D. Gordon - Cambridge, GB
Jason F. MacKay - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 7/04
US Classification:
726 9
Abstract:
Security language constructs may be translated into logic language constructs and vise versa. Logic resolution may be effected using, for example, the logic language constructs. In an example implementation, translation of a security language assertion into at least one logic language rule is described. In another example implementation, translation of a proof graph reflecting a logic language into a proof graph reflecting a security language is described. In yet another example implementation, evaluation of a logic language program using a deterministic algorithm is described.

Dynamic Assertion Providers For Logic-Based Security Policy Languages

US Patent:
8407807, Mar 26, 2013
Filed:
May 25, 2010
Appl. No.:
12/786443
Inventors:
Moritz Y. Becker - Cambridge, GB
Jason Forrest Mackay - Sammamish WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 7/00
US Classification:
726 30, 726 9, 726151, 707783
Abstract:
Architecture that employs dynamic assertion providers in logic-based security policy languages. The dynamic assertion providers provide a mechanism by which data can be processed in an efficient, goal-directed manner. The application of dynamic assertion providers enables the inferencing over type hierarchies, including hierarchies of personally identifiable information and also for file systems which are hierarchal in nature. When searching for facts to bind against for a given subgoal, dynamic assertion providers are also queried. These objects follow an interface which can implement an arbitrary method to provide facts to the logic engine in a goal-directed, on-demand manner. Hierarchical types can be implemented using a hierarchy provider.

Method And System For Downloading Updates

US Patent:
2006013, Jun 15, 2006
Filed:
Dec 14, 2004
Appl. No.:
11/012367
Inventors:
Jason Mackay - Sammamish WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 9/44
US Classification:
717168000
Abstract:
Embodiments of the present invention provide the ability for a software provider to distribute software updates to several different recipients utilizing a peer-to-peer environment. The invention described herein may be used to update any type of software, including, but not limited to, operating software, programming software, anti-virus software, database software, etc. The use of a peer-to-peer environment with added security provides the ability to minimize download time for each peer and also reduce the amount of egress bandwidth that must be provided by the software provider to enable recipients (peers) to obtain the update.

Delegation In Logic-Based Access Control

US Patent:
8607311, Dec 10, 2013
Filed:
Dec 21, 2007
Appl. No.:
11/962761
Inventors:
Moritz Y. Becker - Cambridge, GB
Blair B. Dillaway - Clyde Hill WA, US
Gregory D. Fee - Seattle WA, US
John M. Leen - Seattle WA, US
Jason F. Mackay - Redmond WA, US
Assignee:
Microsoft Corporation - Redmond WA
International Classification:
G06F 7/04
G06F 17/30
G06F 12/00
H04L 29/06
US Classification:
726 4, 726 2, 726 3, 707999001, 707999002, 707999009, 70799901
Abstract:
Access to a resource may be controlled by a policy, such that a request to access the resource is either granted or denied based on what assertions have been made by various principals. To find the assertions that support a grant of access to the resource, a template may be created that defines the nature of assertions that would cause access to succeed. Assertions may be stored in the form of tokens. The template may be used to search an existing token store to find assertions that have been made, and/or to generate assertions that have not been found in the token store and that would satisfy the template. The assertions in the template may be created by performing an abductive reasoning process on an access query.

FAQ: Learn more about Jason Mackay

What is Jason Mackay's current residential address?

Jason Mackay's current known residential address is: 3143 Scenic Lake Dr, Ann Arbor, MI 48108. Please note this is subject to privacy laws and may not be current.

What are the previous addresses of Jason Mackay?

Previous addresses associated with Jason Mackay include: 815 Oak Ridge, Brighton, MI 48116; 815 Oak Ridge Ct, Brighton, MI 48116; 8171 Washington Rd, Branch, MI 49402; 52 Hooper, Quincy, MA 02169; 1121 500, Salt Lake City, UT 84102. Remember that this information might not be complete or up-to-date.

Where does Jason Mackay live?

Las Vegas, NV is the place where Jason Mackay currently lives.

How old is Jason Mackay?

Jason Mackay is 45 years old.

What is Jason Mackay date of birth?

Jason Mackay was born on 1979.

What is Jason Mackay's email?

Jason Mackay has such email addresses: jason.mac***@yahoo.com, jasonmac***@hotmail.com, jmac***@yahoo.com, clarencestewar***@clarencesmail.com, jason.skal***@aol.com, jmac***@bellatlantic.net. Note that the accuracy of these emails may vary and they are subject to privacy laws and restrictions.

What is Jason Mackay's telephone number?

Jason Mackay's known telephone numbers are: 231-898-4806, 413-203-1627, 425-898-0690, 508-617-9253, 805-547-9315, 909-587-2402. However, these numbers are subject to change and privacy restrictions.

How is Jason Mackay also known?

Jason Mackay is also known as: Jason A Mackay, Robert Taylor. These names can be aliases, nicknames, or other names they have used.

Who is Jason Mackay related to?

Known relatives of Jason Mackay are: Cindy Klein, Denise Mackay, Hayley Mackay, Leslie Mackay, Ronald Mackay, Zachary Mackay, Ruby Birch, Ivy Huntington, Pete Galanis, Anatoteli Galanis, Lana Oganesean, Arsen Oganesean. This information is based on available public records.

What are Jason Mackay's alternative names?

Known alternative names for Jason Mackay are: Cindy Klein, Denise Mackay, Hayley Mackay, Leslie Mackay, Ronald Mackay, Zachary Mackay, Ruby Birch, Ivy Huntington, Pete Galanis, Anatoteli Galanis, Lana Oganesean, Arsen Oganesean. These can be aliases, maiden names, or nicknames.

People Directory:

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z